Search results for: fire protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2865

Search results for: fire protection

1875 Interactive IoT-Blockchain System for Big Data Processing

Authors: Abdallah Al-ZoubI, Mamoun Dmour

Abstract:

The spectrum of IoT devices is becoming widely diversified, entering almost all possible fields and finding applications in industry, health, finance, logistics, education, to name a few. The IoT active endpoint sensors and devices exceeded the 12 billion mark in 2021 and are expected to reach 27 billion in 2025, with over $34 billion in total market value. This sheer rise in numbers and use of IoT devices bring with it considerable concerns regarding data storage, analysis, manipulation and protection. IoT Blockchain-based systems have recently been proposed as a decentralized solution for large-scale data storage and protection. COVID-19 has actually accelerated the desire to utilize IoT devices as it impacted both demand and supply and significantly affected several regions due to logistic reasons such as supply chain interruptions, shortage of shipping containers and port congestion. An IoT-blockchain system is proposed to handle big data generated by a distributed network of sensors and controllers in an interactive manner. The system is designed using the Ethereum platform, which utilizes smart contracts, programmed in solidity to execute and manage data generated by IoT sensors and devices. such as Raspberry Pi 4, Rasbpian, and add-on hardware security modules. The proposed system will run a number of applications hosted by a local machine used to validate transactions. It then sends data to the rest of the network through InterPlanetary File System (IPFS) and Ethereum Swarm, forming a closed IoT ecosystem run by blockchain where a number of distributed IoT devices can communicate and interact, thus forming a closed, controlled environment. A prototype has been deployed with three IoT handling units distributed over a wide geographical space in order to examine its feasibility, performance and costs. Initial results indicated that big IoT data retrieval and storage is feasible and interactivity is possible, provided that certain conditions of cost, speed and thorough put are met.

Keywords: IoT devices, blockchain, Ethereum, big data

Procedia PDF Downloads 150
1874 Effect of Concentration of Alkaline and Curing Temperature on Compressive Strength of Geopolymer Concert

Authors: Nursah Kutuk, Sevil Cetinkaya

Abstract:

Geopolymers are becoming new concrete materials to use alongside cement, which are formed due to reaction between alumino-silicates and oxides with alkaline media. Silicates obtained from natural minerals or industrial wastes are used for geopolymer synthesis. Geopolymers have recently received wide attention because of their advantages over other cementitious material like Portland cement. Some of the advantages are high compressive strength, low environmental impact, chemical and fire resistance and thermal stability. In this study, geopolymers were prepared by using inorganic materials such as kaolinite and calcite. The experiments were carried out by varying the concentration of NaOH as 5, 10, 15 and 20 M, and at cure temperature of 22, 45 and 65 °C. Compressive strengths for each mixes at each cure temperature were measured. Results of the analyses indicated that the compressive strength of geopolymers did not increase steadily with increasing concentration of NaOH, but did increase steadily with increasing cure temperature. We examined the effect Na2SiO3/NaOH weight ratio on the properties of the geopolymers, too. It was seen that Na2SiO3/NaOH weight ratio was also important to prepare geopolymers that can be applied to construction industry.

Keywords: geopolymers, compressive strength, kaolinite, calcite

Procedia PDF Downloads 301
1873 The Web of Injustice: Untangling Violations of Personality Rights in European International Private Law

Authors: Sara Vora (Hoxha)

Abstract:

Defamation, invasion of privacy, and cyberbullying have all increased in tandem with the growth of the internet. European international private law may struggle to deal with such transgressions if they occur in many jurisdictions. The current study examines how effectively the legal system of European international private law addresses abuses of personality rights in cyberspace. The study starts by discussing how established legal frameworks are being threatened by online personality rights abuses. The article then looks into the rules and regulations of European international private law that are in place to handle overseas lawsuits. This article examines the different elements that courts evaluate when deciding which law to use in a particular case, focusing on the concepts of jurisdiction, choice of law, and recognition and execution of foreign judgements. Next, the research analyses the function of the European Union in preventing and punishing online personality rights abuses. Key pieces of law that control the collecting and processing of personal data on the Internet, including the General Data Protection Regulation (GDPR) and the e-Commerce Directive, are discussed. In addition, this article investigates how the ECtHR handles cases involving the infringement of personal freedoms, including privacy and speech. The article finishes with an assessment of how well the legal framework of European international private law protects individuals' right to privacy online. It draws attention to problems with the present legal structure, such as the inability to enforce international judgements, the inconsistency between national laws, and the necessity for stronger measures to safeguard people' rights online. This paper concludes that while European international private law provides a useful framework for dealing with violations of personality rights online, further harmonisation and stronger enforcement mechanisms are necessary to effectively protect individuals' rights in the digital age.

Keywords: European international private law, personality rights, internet, jurisdiction, cross-border disputes, data protection

Procedia PDF Downloads 76
1872 An Analysis of Institutional Environments on Corporate Social Responsibility Practices in Nigerian Renewable Energy Firms

Authors: Bolanle Deborah Motilewa, E. K. Rowland Worlu, Gbenga Mayowa Agboola, Ayodele Maxwell Olokundun

Abstract:

Several studies have proposed a one-size fit all approach to Corporate Social Responsibility (CSR) practices, such that CSR as it applies to developed countries is adapted to developing countries, ignoring the differing institutional environments (such as the regulative, economic, social and political environments), which affects the profitability and practices of businesses operating in them. CSR as it applies to filling institutional gaps in developing countries, was categorized into four themes: environmental protection, product and service innovation, social innovation and local cluster development. Based on the four themes, the study employed a qualitative research approach through the use of interviews and review of available publications to study the influence of institutional environments on CSR practices engaged in by three renewable energy firms operating in Nigeria. Over the course of three 60-minutes sessions with the top management and selected workers of the firms, four propositions were made: regulatory environment influences environmental protection practice of Nigerian renewable firms, economic environment influences product and service innovation practice of Nigerian renewable energy firms, the social environment impacts on social innovation in Nigerian renewable energy firms, and political environment affects local cluster development practice of Nigerian renewable energy firms. It was also observed that beyond institutional environments, the international exposure of an organization’s managers reflected in their approach to CSR. This finding on the influence of international exposure on CSR practices creates an area for further study. Insights from this paper are set to help policy makers in developing countries, CSR managers, and future researchers.

Keywords: corporate social responsibility, renewable energy firms, institutional environment, social entrepreneurship

Procedia PDF Downloads 292
1871 Application of Pyridine-based Water-soluble Corrosion Inhibitor in Offshore Sweet Oil Pipeline

Authors: M. S. Yalfani, J. Kohzadi, P. Ghadimi, S. Sobhani, M. Ghadimi

Abstract:

The use of oil and water-soluble corrosion inhibitors has been established in Iranian oil and gas production systems for a long time. Imidazoline and its derivatives are being extensively used which are known as conventional corrosion inhibitors. This type of product has shown significant performance and low side effects, so that could monopolize the market of inhibitors in this region. However, the price growth of imidazolines, as well as the development of new lower-cost components with similar or even higher performance than imidazoline, have influenced the exclusive market of imidazoline-based products. During the latest years, pyridine and its derivatives have challenged imidazoline due to their remarkable anticorrosive properties and lower prices as well. Recently, we presented a formulated water-soluble inhibitor based on pyridine - an alkyl pyridine quaternary salt (APQS) - which could successfully pass all lab tests and eventually succeeded in being applied in an offshore sweet oil pipeline. The product was able to achieve high corrosion protection (> 90 %) with the LPR technique at low dosages of 15-25 ppm under severe corrosion conditions. Moreover, the lab test results showed that the APQS molecule is able to form a strong and persistent bond with the metal surface. The product was later nominated to be evaluated through a field trial in an offshore sweet oil pipeline where PH2S < 0.05 psi and CO2 is 6.4 mol%. The three-month trial - extended to six months- resulted in remarkable internal protection obtained by continuous injection of 10 ppm inhibitor, which was as low as 1 mpy measured by both weight loss corrosion coupons and online ER probes. In addition, no side effects, such as tight emulsion and stable foaming, were observed. The residual of the corrosion inhibitor was measured at the end of the pipeline to ensure the full coverage of the inhibitor throughout the pipeline. Eventually, these promising results were able to convince the end user to consider pyridine-based inhibitors as a reliable alternative to imidazoline.

Keywords: corrosion inhibitor, pyridine, sweet oil, pipeline, offshore

Procedia PDF Downloads 15
1870 Security of Database Using Chaotic Systems

Authors: Eman W. Boghdady, A. R. Shehata, M. A. Azem

Abstract:

Database (DB) security demands permitting authorized users and prohibiting non-authorized users and intruders actions on the DB and the objects inside it. Organizations that are running successfully demand the confidentiality of their DBs. They do not allow the unauthorized access to their data/information. They also demand the assurance that their data is protected against any malicious or accidental modification. DB protection and confidentiality are the security concerns. There are four types of controls to obtain the DB protection, those include: access control, information flow control, inference control, and cryptographic. The cryptographic control is considered as the backbone for DB security, it secures the DB by encryption during storage and communications. Current cryptographic techniques are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, etc.) and chaos cryptography using continuous (Chau, Rossler, Lorenz, etc.) or discreet (Logistics, Henon, etc.) algorithms. The important characteristics of chaos are its extreme sensitivity to initial conditions of the system. In this paper, DB-security systems based on chaotic algorithms are described. The Pseudo Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented using Matlab and their statistical properties are evaluated using NIST and other statistical test-suits. Then, these algorithms are used to secure conventional DB (plaintext), where the statistical properties of the ciphertext are also tested. To increase the complexity of the PRNGs and to let pass all the NIST statistical tests, we propose two hybrid PRNGs: one based on two chaotic Logistic maps and another based on two chaotic Henon maps, where each chaotic algorithm is running side-by-side and starting from random independent initial conditions and parameters (encryption keys). The resulted hybrid PRNGs passed the NIST statistical test suit.

Keywords: algorithms and data structure, DB security, encryption, chaotic algorithms, Matlab, NIST

Procedia PDF Downloads 265
1869 Cloud Computing: Deciding Whether It Is Easier or Harder to Defend Against Cyber Attacks

Authors: Emhemed Shaklawoon, Ibrahim Althomali

Abstract:

We propose that we identify different defense mechanisms that were used before the introduction of the cloud and compare if their protection mechanisms are still valuable and to what degree. Note that in order to defend against vulnerability, we must know how this vulnerability is abused in an attack. Only then, we will be able to recognize if it is easier or harder to defend against cyber attacks.

Keywords: cloud computing, privacy, cyber attacks, defend the cloud

Procedia PDF Downloads 423
1868 Biodiversity And Ecosystem Services In Morocco: Current State And Human Development

Authors: Mohammed Taleb

Abstract:

Morocco is characterized by an important genetic diversity represented by a rich and varied flora with 5211 species and subspecies and many natural ecosystems. Biodiversity and natural ecosystems provide the local population with highly diversified services represented by aromatic and medicinal plants, forage plants, melliferous plants, firewood, lumber, mushrooms, etc. Ecosystem services are currently subject to many pressures: overgrazing and deforestation, climate change, including increased drought, urbanization and forest fire. Conscious of the risks that weigh on biodiversity and ecosystem services, Morocco had made an important effort to reverse the tendencies by developing a consistent biodiversity conservation strategy focused on in-situ and ex-situ conservation. This presentation will be focused on the current state of biodiversity and ecosystem services and their role for the human development and their decline under the action of different pressures (grazing, timber harvest, harvesting of medicinal and aromatic plants, charcoal making...) while emphasizing efforts constructed by Morocco to conserve and sustainably manage biodiversity and ecosystem services.

Keywords: morocco, biodiversity, ecosystem services, local population

Procedia PDF Downloads 95
1867 Chemical Hazards Impact on Efficiency of Energy Storage Battery and its Possible Mitigation's

Authors: Abirham Simeneh Ayalew, Seada Hussen Adem, Frie Ayalew Yimam

Abstract:

Battery energy storage has a great role on storing energy harnessed from different alternative resources and greatly benefit the power sector by supply energy back to the system during outage and regular operation in power sectors. Most of the study shows that there is an exponential increase in the quantity of lithium - ion battery energy storage system due to their power density, economical aspects and its performance. But this lithium ion battery failures resulted in fire and explosion due to its having flammable electrolytes (chemicals) which can create those hazards. Hazards happen in these energy storage system lead to minimize battery life spans or efficiency. Identifying the real cause of these hazards and its mitigation techniques can be the solution to improve the efficiency of battery technologies and the electrode materials should have high electrical conductivity, large surface area, stable structure and low resistance. This paper asses the real causes of chemical hazards, its impact on efficiency, proposed solution for mitigating those hazards associated with efficiency improvement and summery of researchers new finding related to the field.

Keywords: battery energy storage, battery energy storage efficiency, chemical hazards, lithium ion battery

Procedia PDF Downloads 81
1866 Microencapsulation for Enhancing the Survival of S. thermophilus and L. bulgaricus during Spray Drying of Sweetened Yoghurt

Authors: Dibyakanta Seth, Hari Niwas Mishra, Sankar Chandra Deka

Abstract:

Microencapsulation is an established method of protecting bacteria from the adverse conditions. An improved extrusion spraying technique was used to encapsulate mixed bacteria culture of S. thermophilus and L. bulgaricus using sodium alginate as the coating material. The effect of nozzle air pressure (200, 300, 400 and 500 kPa), sodium alginate concentration (1%, 1.5%, 2%, 2.5% and 3% w/v), different concentration of calcium chloride (0.1, 0.2, 1 M) and initial cell loads (10⁷, 10⁸, 10⁹ cfu/ml) on the viability of encapsulated bacteria were investigated. With the increase in air pressure the size of microcapsules decreased, however the effect was non-significant. There was no significant difference (p > 0.05) in the viability of encapsulated cells when the concentration of calcium chloride was increased. Increased level of sodium alginate significantly increased the survival ratio of encapsulated bacteria (P < 0.01). Encapsulation with 3% alginate was treated as optimum since a higher concentration of alginate increased the gel strength of the solution and thus was difficult to spray. Under optimal conditions 3% alginate, 10⁹ cfu/ml cell load, 20 min hardening time in 0.1 M CaCl2 and 400 kPa nozzle air pressure, the viability of bacteria cells was maximum compared to the free cells. The microcapsules made at the optimal condition when mixed with yoghurt and subjected to spray drying at 148°C, the survival ratio was 2.48×10⁻¹ for S. thermophilus and 7.26×10⁻¹ for L. bulgaricus. In contrast, the survival ratio of free cells of S. thermophilus and L. bulgaricus were 2.36×10⁻³ and 8.27×10⁻³, respectively. This study showed a decline in viable cells count of about 0.5 log over a period of 7 weeks while there was a decline of about 1 log in cultures which were incorporated as free cells in yoghurt. Microencapsulation provided better protection at higher acidity compared to free cells. This study demonstrated that microencapsulation of yoghurt culture in sodium alginate is an effective technique of protection against extreme drying conditions.

Keywords: extrusion, microencapsulation, spray drying, sweetened yoghurt

Procedia PDF Downloads 253
1865 Learning from Dendrites: Improving the Point Neuron Model

Authors: Alexander Vandesompele, Joni Dambre

Abstract:

The diversity in dendritic arborization, as first illustrated by Santiago Ramon y Cajal, has always suggested a role for dendrites in the functionality of neurons. In the past decades, thanks to new recording techniques and optical stimulation methods, it has become clear that dendrites are not merely passive electrical components. They are observed to integrate inputs in a non-linear fashion and actively participate in computations. Regardless, in simulations of neural networks dendritic structure and functionality are often overlooked. Especially in a machine learning context, when designing artificial neural networks, point neuron models such as the leaky-integrate-and-fire (LIF) model are dominant. These models mimic the integration of inputs at the neuron soma, and ignore the existence of dendrites. In this work, the LIF point neuron model is extended with a simple form of dendritic computation. This gives the LIF neuron increased capacity to discriminate spatiotemporal input sequences, a dendritic functionality as observed in another study. Simulations of the spiking neurons are performed using the Bindsnet framework. In the common LIF model, incoming synapses are independent. Here, we introduce a dependency between incoming synapses such that the post-synaptic impact of a spike is not only determined by the weight of the synapse, but also by the activity of other synapses. This is a form of short term plasticity where synapses are potentiated or depressed by the preceding activity of neighbouring synapses. This is a straightforward way to prevent inputs from simply summing linearly at the soma. To implement this, each pair of synapses on a neuron is assigned a variable,representing the synaptic relation. This variable determines the magnitude ofthe short term plasticity. These variables can be chosen randomly or, more interestingly, can be learned using a form of Hebbian learning. We use Spike-Time-Dependent-Plasticity (STDP), commonly used to learn synaptic strength magnitudes. If all neurons in a layer receive the same input, they tend to learn the same through STDP. Adding inhibitory connections between the neurons creates a winner-take-all (WTA) network. This causes the different neurons to learn different input sequences. To illustrate the impact of the proposed dendritic mechanism, even without learning, we attach five input neurons to two output neurons. One output neuron isa regular LIF neuron, the other output neuron is a LIF neuron with dendritic relationships. Then, the five input neurons are allowed to fire in a particular order. The membrane potentials are reset and subsequently the five input neurons are fired in the reversed order. As the regular LIF neuron linearly integrates its inputs at the soma, the membrane potential response to both sequences is similar in magnitude. In the other output neuron, due to the dendritic mechanism, the membrane potential response is different for both sequences. Hence, the dendritic mechanism improves the neuron’s capacity for discriminating spa-tiotemporal sequences. Dendritic computations improve LIF neurons even if the relationships between synapses are established randomly. Ideally however, a learning rule is used to improve the dendritic relationships based on input data. It is possible to learn synaptic strength with STDP, to make a neuron more sensitive to its input. Similarly, it is possible to learn dendritic relationships with STDP, to make the neuron more sensitive to spatiotemporal input sequences. Feeding structured data to a WTA network with dendritic computation leads to a significantly higher number of discriminated input patterns. Without the dendritic computation, output neurons are less specific and may, for instance, be activated by a sequence in reverse order.

Keywords: dendritic computation, spiking neural networks, point neuron model

Procedia PDF Downloads 134
1864 Design, Shielding and Infrastructure of an X-Ray Diagnostic Imaging Area

Authors: D. Diaz, C. Guevara, P. Rey

Abstract:

This paper contains information about designing, shielding and protocols building in order to avoid ionizing radiation in X-Rays imaging areas as generated by X-Ray, mammography equipment, computed tomography equipment and digital subtraction angiography equipment, according to global standards. Furthermore, tools and elements about infrastructure to improve protection over patients, physicians and staff involved in a diagnostic imaging area are presented. In addition, technical parameters about each machine and the architecture designs and maps are described.

Keywords: imaging area, X-ray, shielding, dose

Procedia PDF Downloads 449
1863 Flood Prevention Strategy for Reserving Quality Ground Water Considering Future Population Growth in Kabul

Authors: Said Moqeem Sadat, Saito Takahiro, Inuzuka Norikazu, Sugiyama Ikuo

Abstract:

Kabul city is the capital of Afghanistan with a population of about 4.0 million in 2009 and 6.5 million in 2025. It is geographically located in a narrow plain valley along the Kabul River and is surrounded by high mountains. Due to its sharp geological condition, the city has been suffering from floods caused by storm water and snow melting water in the rainy season. Meanwhile, potable water resources are becoming a critical issue as the underground water table is decreasing falling rapidly due to domestic usage, industrial and agricultural activities usage especially in the dry season. This paper focuses on flood water management in Kabul including suburban agricultural area considering not only for flood protection but also: 1. To reserve the quality underground water for the future population growth. 2. To irrigate farming area in dry season using storm water ponds in rainy season. 3. To discharge city contaminated flood water to the downstream safely using existing channels/new pipes. Cost and benefit is considered in this study to find out a suitable flood protection method both in rural area and city center from a view point of 1 to 3 mentioned above. In this analysis, cost mainly consists of lost opportunity to develop lands due to flood ponds in addition to construction and maintenance one including connecting channels for water collecting/discharging. Benefit mainly consists of damage reduction of flood loss due to counter measures (this is corresponding cost) in addition to the contribution to agricultural crops. As far as reservation of the ground water for the future city growth is concerned, future demand and supply are compared in case that the pumping amount is limited by this irrigation system.

Keywords: cost-benefit, hydrological modeling, water management, water quality

Procedia PDF Downloads 271
1862 Valorization and Conservation of Rock Painting and Engravings of Kabylia Region (Algeria)

Authors: Samia Ait Ali Yahia

Abstract:

In Algeria, the most impressive and most known prehistoric art is the painted or engraved rock art which is present with abundance in several regions. The existence of rock art in Great Kabylia region has been known for over sixty years. The main purpose of this research is to show the dangers facing these rock paintings and engravings and what are the arrangements for their protection and recovery. As every vestige destroyed is a part of the world's memory which disappears, some steps have to be taken in order to protect these historical and archaeological heritages.

Keywords: rock paintings and engravings, preservation, valorization, Kabylia

Procedia PDF Downloads 456
1861 Synthesis and Characterization of Heterogeneous Silver Nanoparticles for Protection of Ancient Egyptian Artifacts from Microbial Deterioration

Authors: Mohamed Abd Elfattah Ibraheem Elghrbawy

Abstract:

Biodeterioration of cultural heritage is a complex process which is caused by the interaction of many physical, chemical and biological agents; the growth of microorganisms can cause staining, cracking, powdering, disfigurement and displacement of monuments material, which leads to the permanent loss of monuments material. Organisms causing biodeterioration on monuments have usually been controlled by chemical products (biocides). In order to overcome the impact of biocides on the environment, human health and monument substrates, alternative tools such as antimicrobial agents from natural products can be used for monuments conservation and protection. The problem is how to formulate antibacterial agents with high efficiency and low toxicity. Various types of biodegradable metal nanoparticles (MNPs) have many applications in plant extract delivery. So, Nano-encapsulation of metal and natural antimicrobial agents using polymers such as chitosan increases their efficacy, specificity and targeting ability. Green synthesis and characterization of metal nanoparticles such as silver with natural products extracted from some plants having antimicrobial properties, using the ecofriendly method one pot synthesis. Encapsulation of the new synthesized mixture using some biopolymers such as chitosan nanoparticles. The dispersions and homogeneity of the antimicrobial heterogeneous metal nanoparticles encapsulated by biopolymers will be characterized and confirmed by Fourier Transform Infrared Spectroscopy (FTIR), Transmission Electron Microscopy (TEM), Scanning Electron Microscopy (SEM) and Zeta seizer. The effect of the antimicrobial biopolymer metal nano-formulations on normal human cell lines will be investigated to evaluate the environmental safety of these formulations. The antimicrobial toxic activity of the biopolymeric antimicrobial metal nanoparticles formulations will be will be investigated to evaluate their efficiency towards different pathogenic bacteria and fungi.

Keywords: antimicrobial, biodeterioration, chitosan, cultural heritage, silver

Procedia PDF Downloads 81
1860 Credit Cooperatives: A Factor for Improving the Sustainable Management of Private Forests

Authors: Todor Nickolov Stoyanov

Abstract:

Cooperatives are present in all countries and in almost all sectors, including agriculture, forestry, food, finance, health, marketing, insurance and credit. Strong cooperatives are able to overcome many of the difficulties faced by private owners. Cooperatives use seven principles, including the 'Community Concern" principle, which enables cooperatives to work for the sustainable development of the community. The members of cooperatives may use different systems for generating year-round employment and for receiving sustainable income through performing different forestry activities. Various methods are used during the preparation of the report. These include literature reviews, statistics, secondary data and expert interviews. The members of the cooperatives are benefits exclusively from increasing the efficiency of the various products and from the overall yield of the harvest, and ultimately from achieving better profit through cooperative efforts. Cooperatives also use other types of activities that are an additional opportunity for cooperative income. There are many heterogeneous activities in the production and service sectors of the forest cooperatives under consideration. Some cooperatives serve dairies, distilleries, woodworking enterprises, tourist homes, hotels and motels, shops, ski slopes, sheep breeding, etc. Through the revenue generated by the activity, cooperatives have the opportunity to carry out various environmental and protective activities - recreation, water protection, protection of endangered and endemic species, etc., which in the case of small-scale forests cannot be achieved and the management is not sustainable. The conclusions indicate the results received in the analysis. Cooperative management of forests and forest lands gives higher incomes to individual owners. The management of forests and forest lands through cooperatives helps to carry out different environmental and protective activities. Cooperative forest management provides additional means of subsistence to the owners of poor forest lands. Cooperative management of forests and forest lands support owners to implement the forest management plans and to apply sustainable management of these territories.

Keywords: cooperative, forestry, forest owners, principles of cooperation

Procedia PDF Downloads 245
1859 Numerical Study on the Ultimate Load of Offshore Two-Planar Tubular KK-Joints at Fire-Induced Elevated Temperatures

Authors: Hamid Ahmadi, Neda Azari-Dodaran

Abstract:

A total of 270 nonlinear steady-state finite element (FE) analyses were performed on 54 FE models of two-planar circular hollow section (CHS) KK-joints subjected to axial loading at five different temperatures (20 ºC, 200 ºC, 400 ºC, 550 ºC, and 700 ºC). The primary goal was to investigate the effects of temperature and geometrical characteristics on the ultimate strength, modes of failure, and initial stiffness of the KK-joints. Results indicated that on an average basis, the ultimate load of a two-planar tubular KK-joint at 200 ºC, 400 ºC, 550 ºC, and 700 ºC is 90%, 75%, 45%, and 16% of the joint’s ultimate load at ambient temperature, respectively. Outcomes of the parametric study showed that replacing the yield stress at ambient temperature with the corresponding value at elevated temperature to apply the EN 1993-1-8 equations for the calculation of the joint’s ultimate load at elevated temperatures may lead to highly unconservative results that might endanger the safety of the structure. Results of the parametric study were then used to develop a set of design formulas, through nonlinear regression analyses, to calculate the ultimate load of two-planar tubular KK-joints subjected to axial loading at elevated temperatures.

Keywords: ultimate load, two-planar tubular KK-joint, axial loading, elevated temperature, parametric equation

Procedia PDF Downloads 160
1858 Successful Natural Reproduction of the 'Extinct in the Wild; Yangtze Sturgeon Through Ecological Hydraulics-Based Spawning Habitat Creation

Authors: Hao Du, Xuan Ban, Pengcheng Li, Jinming Wu, Junyi Li

Abstract:

The Yangtze sturgeon, a Class I protected aquatic wildlife species in China, has suffered a rapid decline due to human activities such as dam construction, channel dredging, sand and stone mining, and overfishing. Its natural reproduction ceased by 2000, and it was assessed as ‘extinct in the wild’ by the IUCN in 2022. To save this endangered species, the Chinese government is fully committed to restoring the Yangtze's fishery resources, implementing policies such as the ‘10-year fishing ban’ and the Yangtze River Protection Law. Researchers have established an artificial population tier using limited wild stock and attempted to restore natural reproduction through parental release. Based on ecological hydraulics simulations of historical spawning grounds of the Chinese sturgeon and Yangtze sturgeon in the upper Yangtze River, this study identified flow velocity, substrate, and topography as key environmental factors for sturgeon reproduction. Through six consecutive years of indoor artificial spawning ground simulations, researchers pinpointed critical environmental parameters for Yangtze sturgeon's natural reproduction. Subsequently, they created a spawning habitat in the natural waters of the Jiajiang River, a branch of the Yangtze, successfully inducing natural reproduction of the Yangtze sturgeon for two consecutive years, with a total of 980,000 eggs laid and fertilization rates ranging from 54% to 83%. This breakthrough resolved the 20-year challenge of interrupted natural reproduction of the Yangtze sturgeon. This report systematically introduces research progress on the protection of the Yangtze sturgeon, providing a classic case for the reconstruction of wild populations of critically endangered aquatic animals and offering a reference for global freshwater biodiversity conservation.

Keywords: dam, ecohydraulic conditions, spawning ground, habitat creation, natural reproduction, sturgeon, Yangzte River

Procedia PDF Downloads 8
1857 Psychopathic Disorders and Judges Sentencing: Can Neurosciences Change this Aggravating Factor in a Mitigating Factor?

Authors: Kevin Moustapha

Abstract:

Psychopathy is perceived today as being «the most important concept in the criminal justice system» and as «the most important legal notion of the early 21 th century». The explosion of research related to psychopathy seems to perfectly illustrate this trend. Traditionally, many studies tend to focus on links between insanity defense and psychopathy. That is why our purpose in this article is to analyze psychopathic disorders in the scope of judges sentencing in Canada. Indeed, in every Canadian case related to dangerous offenders, judges must balance between fairness and protection of the individuals rights of the accused and protection of society from dangerous predators who may commit future acts of physical or sexual violence. Increasingly, psychopathic disorders are taking an important part in judge sentencing, especially in Canada. This phenomenon can be illustrated by the high proportion of psychopath offenders incarcerated in North American prisons. Many decisions in Canadians courtrooms seem to point out that psychopathy is often used as a strong argument by the judges to preserve public safety. The fact that psychopathy is often associated with violence, recklessness and recidivism, it could explain why many judges consider psychopathic disorders as an aggravating factor. Generally, the judge reasoning is based on article 753 of Canadian Criminal Code related to dangerous offenders, which is used for individuals who show a pattern of repetitive and persistent aggressive behaviour. However, with cognitive neurosciences, the psychopath’s situation in courtrooms would probably change. Cerebral imaging and news data provided by the neurosciences show that emotional and volitional functions in psychopath’s brains are impaired. Understanding these new issues could enable some judges to recognize psychopathic disorders as a mitigating factor. Two important questions ought to be raised in this article: can exploring psychopaths ‘brains really change the judge sentencing in Canadian courtrooms? If yes, can judges consider psychopathy more as a mitigating factor than an aggravating factor?

Keywords: criminal law, judges sentencing, neurosciences, psychopathy

Procedia PDF Downloads 927
1856 The Effect of Composite Hybridization on the Back Face Deformation of Armor Plates

Authors: Attef Kouadria, Yehya Bouteghrine, Amar Manaa, Tarek Mouats, Djalel Eddine Tria, Hamid Abdelhafid Ghouti

Abstract:

Personal protection systems have been used in several forms for centuries. The need for light-weight composite structures has been in great demand due to their weight and high mechanical properties ratios in comparison to heavy and cumbersome steel plates. In this regard, lighter ceramic plates with a backing plate made of high strength polymeric fibers, mostly aramids, are widely used for protection against ballistic threats. This study aims to improve the ballistic performance of ceramic/composite plates subjected to ballistic impact by reducing the back face deformation (BFD) measured after each test. A new hybridization technique was developed in this investigation to increase the energy absorption capabilities of the backing plates. The hybridization consists of combining different types of aramid fabrics with different linear densities of aramid fibers (Dtex) and areal densities with an epoxy resin to form the backing plate. Therefore, several composite structures architectures were prepared and tested. For better understanding the effect of the hybridization, a serial of tensile, compression, and shear tests were conducted to determine the mechanical properties of the homogeneous composite materials prepared from different fabrics. It was found that the hybridization allows the backing plate to combine between the mechanical properties of the used fabrics. Aramid fabrics with higher Dtex were found to increase the mechanical strength of the backing plate, while those with lower Dtex found to enhance the lateral wave dispersion ratio due to their lower areal density. Therefore, the back face deformation was significantly reduced in comparison to a homogeneous composite plate.

Keywords: aramid fabric, ballistic impact, back face deformation, body armor, composite, mechanical testing

Procedia PDF Downloads 152
1855 A Benchmark System for Testing Medium Voltage Direct Current (MVDC-CB) Robustness Utilizing Real Time Digital Simulation and Hardware-In-Loop Theory

Authors: Ali Kadivar, Kaveh Niayesh

Abstract:

The integration of green energy resources is a major focus, and the role of Medium Voltage Direct Current (MVDC) systems is exponentially expanding. However, the protection of MVDC systems against DC faults is a challenge that can have consequences on reliable and safe grid operation. This challenge reveals the need for MVDC circuit breakers (MVDC CB), which are in infancies of their improvement. Therefore will be a lack of MVDC CBs standards, including thresholds for acceptable power losses and operation speed. To establish a baseline for comparison purposes, a benchmark system for testing future MVDC CBs is vital. The literatures just give the timing sequence of each switch and the emphasis is on the topology, without in-depth study on the control algorithm of DCCB, as the circuit breaker control system is not yet systematic. A digital testing benchmark is designed for the Proof-of-concept of simulation studies using software models. It can validate studies based on real-time digital simulators and Transient Network Analyzer (TNA) models. The proposed experimental setup utilizes data accusation from the accurate sensors installed on the tested MVDC CB and through general purpose input/outputs (GPIO) from the microcontroller and PC Prototype studies in the laboratory-based models utilizing Hardware-in-the-Loop (HIL) equipment connected to real-time digital simulators is achieved. The improved control algorithm of the circuit breaker can reduce the peak fault current and avoid arc resignation, helping the coordination of DCCB in relay protection. Moreover, several research gaps are identified regarding case studies and evaluation approaches.

Keywords: DC circuit breaker, hardware-in-the-loop, real time digital simulation, testing benchmark

Procedia PDF Downloads 81
1854 Reliability Analysis of Computer Centre at Yobe State University Using LRU Algorithm

Authors: V. V. Singh, Yusuf Ibrahim Gwanda, Rajesh Prasad

Abstract:

In this paper, we focus on the reliability and performance analysis of Computer Centre (CC) at Yobe State University, Damaturu, Nigeria. The CC consists of three servers: one database mail server, one redundant and one for sharing with the client computers in the CC (called as a local server). Observing the different possibilities of the functioning of the CC, the analysis has been done to evaluate the various popular measures of reliability such as availability, reliability, mean time to failure (MTTF), profit analysis due to the operation of the system. The system can ultimately fail due to the failure of router, redundant server before repairing the mail server and switch failure. The system can also partially fail when a local server fails. The failed devices have restored according to Least Recently Used (LRU) techniques. The system can also fail entirely due to a cooling failure of the server, electricity failure or some natural calamity like earthquake, fire tsunami, etc. All the failure rates are assumed to be constant and follow exponential time distribution, while the repair follows two types of distributions: i.e. general and Gumbel-Hougaard family copula distribution.

Keywords: reliability, availability Gumbel-Hougaard family copula, MTTF, internet data centre

Procedia PDF Downloads 532
1853 Chemical Warfare Agent Simulant by Photocatalytic Filtering Reactor: Effect of Operating Parameters

Authors: Youcef Serhane, Abdelkrim Bouzaza, Dominique Wolbert, Aymen Amin Assadi

Abstract:

Throughout history, the use of chemical weapons is not exclusive to combats between army corps; some of these weapons are also found in very targeted intelligence operations (political assassinations), organized crime, and terrorist organizations. To improve the speed of action, important technological devices have been developed in recent years, in particular in the field of protection and decontamination techniques to better protect and neutralize a chemical threat. In order to assess certain protective, decontaminating technologies or to improve medical countermeasures, tests must be conducted. In view of the great toxicity of toxic chemical agents from (real) wars, simulants can be used, chosen according to the desired application. Here, we present an investigation about using a photocatalytic filtering reactor (PFR) for highly contaminated environments containing diethyl sulfide (DES). This target pollutant is used as a simulant of CWA, namely of Yperite (Mustard Gas). The influence of the inlet concentration (until high concentrations of DES (1200 ppmv, i.e., 5 g/m³ of air) has been studied. Also, the conversion rate was monitored under different relative humidity and different flow rates (respiratory flow - standards: ISO / DIS 8996 and NF EN 14387 + A1). In order to understand the efficacity of pollutant neutralization by PFR, a kinetic model based on the Langmuir–Hinshelwood (L–H) approach and taking into account the mass transfer step was developed. This allows us to determine the adsorption and kinetic degradation constants with no influence of mass transfer. The obtained results confirm that this small configuration of reactor presents an extremely promising way for the use of photocatalysis for treatment to deal with highly contaminated environments containing real chemical warfare agents. Also, they can give birth to an individual protection device (an autonomous cartridge for a gas mask).

Keywords: photocatalysis, photocatalytic filtering reactor, diethylsulfide, chemical warfare agents

Procedia PDF Downloads 105
1852 Human Wildlife Conflict Outside Protected Areas of Nepal: Causes, Consequences and Mitigation Strategies

Authors: Kedar Baral

Abstract:

This study was carried out in Mustang, Kaski, Tanahun, Baitadi, and Jhapa districts of Nepal. The study explored the spatial and temporal pattern of HWC, socio economic factors associated with it, impacts of conflict on life / livelihood of people and survival of wildlife species, and impact of climate change and forest fire onHWC. Study also evaluated people’s attitude towards wildlife conservation and assessed relevant policies and programs. Questionnaire survey was carried out with the 250 respondents, and both socio-demographic and HWC related information werecollected. Secondary information were collected from Divisional Forest Offices and Annapurna Conservation Area Project.HWC events were grouped by season /months/sites (forest type, distances from forest, and settlement), and the coordinates of the events were exported to ArcGIS. Collected data were analyzed using descriptive statistics in Excel and R Program. A total of 1465 events were recorded in 5 districts during 2015 and 2019. Out of that, livestock killing, crop damage, human attack, and cattle shed damage events were 70 %, 12%, 11%, and 7%, respectively. Among 151 human attack cases, 23 people were killed, and 128 were injured. Elephant in Terai, common leopard and monkey in Middle Mountain, and snow leopard in high mountains were found as major problematic animals. Common leopard attacks were found more in the autumn, evening, and on human settlement area. Whereas elephant attacks were found higher in winter, day time, and on farmland. Poor people farmers were found highly victimized, and they were losing 26% of their income due to crop raiding and livestock depredation. On the other hand, people are killing many wildlife in revenge, and this number is increasing every year. Based on the people's perception, climate change is causing increased temperature and forest fire events and decreased water sources within the forest. Due to the scarcity of food and water within forests, wildlife are compelled to dwell at human settlement area, hence HWC events are increasing. Nevertheless, more than half of the respondents were found positive about conserving entire wildlife species. Forests outside PAs are under the community forestry (CF) system, which restored the forest, improved the habitat, and increased the wildlife.However, CF policies and programs were found to be more focused on forest management with least priority on wildlife conservation and HWC mitigation. Compensation / relief scheme of government for wildlife damage was found some how effective to manage HWC, but the lengthy process, being applicable to the damage of few wildlife species and highly increasing events made it necessary to revisit. Based on these facts, the study suggest to carry out awareness generation activities to the poor farmers, linking the property of people with the insurance scheme, conducting habitat management activities within CF, promoting the unpalatable crops, improvement of shed house of livestock, simplifying compensation scheme and establishing a fund at the district level and incorporating the wildlife conservation and HWCmitigation programs in CF. Finally, the study suggests to carry out rigorous researches to understand the impacts of current forest management practices on forest, biodiversity, wildlife, and HWC.

Keywords: community forest, conflict mitigation, wildlife conservation, climate change

Procedia PDF Downloads 117
1851 Insect Outbreaks, Harvesting and Wildfire in Forests: Mathematical Models for Coupling Disturbances

Authors: M. C. A. Leite, B. Chen-Charpentier, F. Agusto

Abstract:

A long-term goal of sustainable forest management is a relatively stable source of wood and a stable forest age-class structure has become the goal of many forest management practices. In the absence of disturbances, this forest management goal could easily be achieved. However, in the face of recurring insect outbreaks and other disruptive processes forest planning becomes more difficult, requiring knowledge of the effects on the forest of a wide variety of environmental factors (e.g., habitat heterogeneity, fire size and frequency, harvesting, insect outbreaks, and age distributions). The association between distinct forest disturbances and the potential effect on forest dynamics is a complex matter, particularly when evaluated over time and at large scale, and is not well understood. However, gaining knowledge in this area is crucial for a sustainable forest management. Mathematical modeling is a tool that can be used to broader the understanding in this area. In this talk we will introduce mathematical models formulation incorporating the effect of insect outbreaks either as a single disturbance in the forest population dynamics or coupled with other disturbances: either wildfire or harvesting. The results and ecological insights will be discussed.

Keywords: age-structured forest population, disturbances interaction, harvesting insects outbreak dynamics, mathematical modeling

Procedia PDF Downloads 527
1850 Effect of Lime and Leaf Ash on Engineering Properties of Red Mud

Authors: Pawandeep Kaur, Prashant Garg

Abstract:

Red mud is a byproduct of aluminum extraction from Bauxite industry. It is dumped in a pond which not only uses thousands of acres of land but having very high pH, it pollutes the ground water and the soil also. Leaves are yet another big waste especially during autumn when they contribute immensely to the blockage of drains and can easily catch fire, among other risks hence also needs to be utilized effectively. The use of leaf ash and red mud in highway construction as a filling material may be an efficient way to dispose of leaf ash and red mud. In this study, leaf ash and lime were used as admixtures to improve the geotechnical engineering properties of red mud. The red mud was taken from National Aluminum Company Limited, Odisha, and leaf ash was locally collected. The aim of present study is to investigate the effect of lime and leaf ash on compaction characteristics and strength characteristics of red mud. California Bearing Ratio and Unconfined Compression Strength tests were performed on red mud by varying different percentages of lime and leaf ash. Leaf ash was added in proportion 2%,4%,6%,8% and 10% whereas lime was added in proportions of 5% to 15%. Optimized value of lime was decided with respect to maximum CBR (California Bearing Ratio) of red mud mixed with different proportions of lime. An increase of 300% in California Bearing ratio of red mud and an increase of 125% in Unconfined Compression Strength values were observed. It may, therefore, be concluded that red mud may be effectively utilized in the highway industry as a filler material.

Keywords: stabilization, lime, red mud, leaf ash

Procedia PDF Downloads 244
1849 Effect the Use of Steel Fibers (Dramix) on Reinforced Concrete Slab

Authors: Faisal Ananda, Junaidi Al-Husein, Oni Febriani, Juli Ardita, N. Indra, Syaari Al-Husein, A. Bukri

Abstract:

Currently, concrete technology continues to grow and continue to innovate one of them using fibers. Fiber concrete has advantages over non-fiber concrete, among others, strong against the effect of shrinkage, ability to reduce crack, fire resistance, etc. In this study, concrete mix design using the procedures listed on SNI 03-2834-2000. The sample used is a cylinder with a height of 30 cm and a width of 15cm in diameter, which is used for compression and tensile testing, while the slab is 400cm x 100cm x 15cm. The fiber used is steel fiber (dramix), with the addition of 2/3 of the thickness of the slabs. The charging is done using a two-point loading. From the result of the research, it is found that the loading of non-fiber slab (0%) of the initial crack is the maximum crack that has passed the maximum crack allowed with a crack width of 1.3 mm with a loading of 1160 kg. The initial crack with the largest load is found on the 1% fiber mixed slab, with the initial crack also being a maximum crack of 0.5mm which also has exceeded the required maximum crack. In the 4% slab the initial crack of 0.1 mm is a minimal initial crack with a load greater than the load of a non-fiber (0%) slab by load1200 kg. While the maximum load on the maximum crack according to the applicable maximum crack conditions, on the 5% fiber mixed slab with a crack width of 0.32mm by loading 1250 kg.

Keywords: crack, dramix, fiber, load, slab

Procedia PDF Downloads 515
1848 Women Mayors and Management of Spanish Councils: An Empirical Analysis

Authors: Carmen Maria Hernandez-Nicolas, Juan Francisco Martín-Ugedo, Antonio Mínguez-Vera

Abstract:

This paper analyses the influence of gender of the mayors of Spanish local governments on different budget items using a sample of 8,243 town councils between 2002 and 2010 period and 64,361 observations. The system Generalized Method of Moments (GMM) technique was employed to examine this panel data. This powerful methodology allows controlling for the endogenity of the variables and the heterogeneity of the sample. Unlike previous works focused on the study of gender influence on firm decisions, the present work analyzes the influence of the gender of the major in the council’s decisions. Specifically, we examine the differences in financial liabilities, security, protection and social promotion expenses and income items relating to public management. In addition, the study focuses on the Spanish context, which is characterized by the presence of decentralization of public responsibility to a greater extent than in neighboring countries, feeding the debate on the operational efficiency of local government increased with an open debate on the importance of gender in public management. The results show that female mayors tend to have lower expenses in general without significant differences in incomes obtained for men and women majors. We also find that female majors incur fewer financial liabilities, one of the most important problems in the Spanish public sector. However, despite of cutting in the public sector, these councils have higher expenditure on security, protection and social promotion. According to these evidences, the presence of women in politics may serve to improve the councils’ economic situation and it is not only necessary for social justice but for economics efficiency. Besides, in councils with more inhabitants, women mayors are more common, but women who served for a very long time are less common.

Keywords: councils, gender, local budgets, public management, women mayors

Procedia PDF Downloads 401
1847 City on Fire: An Ethnography of Play and Politics in Johannesburg Nightclubs

Authors: Beth Vale

Abstract:

Academic research has often neglected the city after dark. Surprisingly little consideration has been given to the every night life of cities: the spatial tactics and creative insurgencies of urban residents when night falls. The focus on ‘pleasure’ in the nocturnal city has often negated the subtle politics of night-time play, embedded in expressions of identity, attachment and resistance. This paper investigates Johannesburg nightclubs as sites of quotidian political labour, through which young people contest social space and their place in it, thereby contributing to the city’s effective and socio-political cartography. The tactical remodelling of the nocturnal city through nightclubbing traces lines of desire (material, emotional, sexual), affiliation, and fear. These in turn map onto young people’s expressions of their social and political identities, as well as their attempts at place-making in a ‘post-apartheid’ context. By examining the micro-politics of the cities' nightclubs, this paper speaks back to an earlier post-94 literature, which regularly characterised Johannesburg youth as superficial, individualist and idealistic. Similarly, some might position nightclubs as sites of frivolous consumption or liberatory permissiveness. Yet because nightclub spaces are racialised, classed and gendered, historically-signified and socially regulated, they are also profoundly political. Through ordinary encounters on the cities' dancefloors, young Jo’burgers are imagining, contesting and negotiating their socio-political identities and indeed their claims to the city. Meanwhile, the politics of this generation of youth, who are increasingly critical of the utopian post-apartheid city, are being increasingly inserted and coopted into night-time cultures. Data for this study was gathered through five months of ethnographic fieldwork in Johannesburg nightclubs, including over 120 hours of participant observation and in-depth interviews with organisers and partygoers. Interviewees recognised that parties, rather than being simple frivolity, are a cacophony of celebration, mourning, worship, rage, rebellion and attachment. Countering standard associations between partying and escapism, party planners, venue owners and nightclub audiences were infusing night-time infrastructures with the aesthetics of politics and protest. Not unlike parties, local political assemblies so often rely on music, dance, the occupation of space, and a heaving crowd. References to social movements, militancy and anti-establishment emerged in nightclub themes, dress codes and décor. Metaphors of fire crossed over between party and protest, both of which could be described as having ‘been lit’ or having ‘brought flames’. More so, young people’s articulations of the city’s night-time geography, and their place in it, reflected articulations of race, class and ideological affiliation. The location, entrance fees and stylistic choices of one’s chosen club destination demarcated who was welcome, while also signalling membership to a particular politics (whether progressive or materialistic, inclusive or elitist, mainstream or counter-culture). Because of their ability to divide and unite, aggravate and titillate, mask and reveal, club cultures might offer a mirror to the complex socialities of a generation of Jo’burg youth, as they inhabit, and bring into being, a contemporary South African city.

Keywords: affect, Johannesburg, nightclub, nocturnal city, politics

Procedia PDF Downloads 229
1846 Intrusion Detection in SCADA Systems

Authors: Leandros A. Maglaras, Jianmin Jiang

Abstract:

The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.

Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection

Procedia PDF Downloads 555